XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

According to a list of the worst passwords in 2017 compiled by Splashdata, some of the worst passwords included “password” and “123456.” These two have topped the list since at least 2010, when Splashdata made their debut survey. Other passwords included in the top five include “12345678,” “qwerty,” and “12345.” Even “starwars” made the list at #16. For further reference, you can view the list of the worst passwords in 2017 here.

Best practices for password security are relatively well-known, especially considering how many experts study this particular field. Here are some tips from the guidelines recommended by the United States Computer Emergency Readiness Team, or US-CERT. In fact, US-CERT was created by the Department of Homeland Security for the specific purpose of preserving online security against threats.

Some sites or applications force users to use these best practices when creating a password, so do yourself a favor and keep these in mind:

  1. Use different passwords on different systems and accounts.
  2. Don't use passwords that are based on personal information that can be easily accessed or guessed.
  3. Use a combination of capital and lowercase letters, numbers, and special characters.
  4. Don't use words that can be found in any dictionary of any language.
  5. Develop mnemonics (or spoken memory tricks) such as passphrases for remembering complex passwords.
  6. Consider using a password manager program to keep track of your passwords.

XFER is of the firm mind that you should never underestimate the importance of network security best practices--particularly password security. To learn more about how you can secure your business, reach out to us at 734-927-6666 / 800-Get-XFER.

Unpaid Invoices Were a $825 Billion Problem Last Y...
What Does Redundancy Mean for Your Business


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Data Small Business Hosted Solutions Hardware Mobile Devices Productivity Google Mobile Office VoIP Email Gadgets Malware Quick Tips Network Security Network IT Support Efficiency Innovation Social Media Business Management IT Services Miscellaneous Business Continuity Smartphones Upgrade Server Virtualization Business Windows Communication Disaster Recovery Computer Microsoft Office Managed IT Services Communications User Tips Users Data Backup Passwords Browser Mobile Device Management Android Save Money Smartphone Marketing Ransomware Holiday WiFi Data Recovery Alert Tech Term Mobile Computing Outsourced IT Vendor Management Remote Monitoring Internet of Things Cybercrime Windows 10 Operating System Computers Bring Your Own Device Apple BDR BYOD Information Technology Cloud Computing Avoiding Downtime Remote Computing Chrome IT Solutions Current Events Automation The Internet of Things Artificial Intelligence History Best Practice Router Going Green Telephone Systems Firewall Big Data VPN Collaboration Phone System Hacking Health Trending Wireless Technology Social Engineering IT Consultant Employer-Employee Relationship Cybersecurity Spam Facebook Application Bandwidth Lithium-ion Battery Managed IT Services Excel Office App Money Budget Printer Proactive IT Business Managament iPhone Windows 10 Fax Server Content Filtering Maintenance Windows 8 Networking Two-factor Authentication Unified Threat Management How To Mobility Business Intelligence Recovery Applications Tutorials Virus Customer Relationship Management Data Security Phishing Analytics Hard Drives Training Mouse Website Managed IT Gmail Sports Value Apps Private Cloud Data Protection User Error Redundancy PowerPoint Law Enforcement Humor Antivirus Office 365 Productivity Outlook Identity Theft Connectivity Downtime Save Time Inbound Marketing File Sharing Memory IT Support Office Tips Google Drive IT Management Conferencing Vulnerability Compliance Administration Flexibility Tech Support Search Entertainment Tablet Mobile Device Social Networking Scam Twitter Digital Payment Retail Document Management Settings Computer Repair Streaming Media Risk Management Data Management Information Blockchain Network Congestion Analysis Word Saving Time Encryption Augmented Reality Paperless Office Intranet Computer Accessories Windows 7 Managed Service Running Cable Cleaning Wearable Technology Password Wireless Physical Security Public Cloud Webinar Robot USB SaaS Social OneNote Credit Cards Virtual Assistant Best Available Bluetooth Data storage Data Storage Touchscreen Servers People Internet Exlporer Fraud eWaste Telephone System Samsung CES PDF IT Plan Work/Life Balance Data Breach Instant Messaging Safety Online Currency Wi-Fi Access Control HaaS End of Support Environment Recycling YouTube Video Surveillance Workers Smart Tech Point of Sale Government Content Management Human Resources Education Unsupported Software Meetings Infrastructure Biometrics Machine Learning Statistics Data loss Piracy IT service DDoS IBM Update Hacker Solid State Drive Programming Administrator Skype Leadership Comparison Black Market Spam Blocking Staff Screen Mirroring Bloatware Chromecast 3D Online Shopping 360 Emails Managing Stress Domains Practices Distributed Denial of Service Files Scheduling Google Docs Science Addiction Virtual Private Network eBay Accountants Business Technology LinkedIn Botnet Business Mangement Electronic Medical Records Notifications Wiring Data Warehousing Specifications Business Owner Enterprise Content Management Net Neutrality Alerts Start Menu Theft Windows 10s Voice over Internet Protocol Digital Signature Charger Cast Entrepreneur Students Laptop Windows 8.1 Update Regulations Evernote Hosted Computing Proactive Colocation Help Desk Tablets Cache Shadow IT Display Project Management Text Messaging HBO HIPAA SharePoint Travel Criminal Hiring/Firing Devices GDPR Hybrid Cloud Debate Gaming Console Millennials Windows Media Player Virtual Desktop Password Management Work Station Mobile Cortana Hiring/Firing Multi-Factor Security Strategy Computer Care Cost Management Healthcare Touchpad Wireless Charging Hosted Solution Inventory IaaS Remote Monitoring and Maintenance Computing Infrastructure Upgrades Analyitcs Wireless Internet Warranty Legal Frequently Asked Questions Keyboard IoT Relocation Thought Leadership E-Commerce Workforce Customer Service NIST Monitor Professional Services Google Apps Audit Lifestyle Electronic Health Records Flash Fiber-Optic Netflix Consultant Line of Business Root Cause Analysis Wire Tip of the week Amazon Macro Software as a Service Content Filter IT Security Camera Telecommuting Supercomputer Cameras Co-managed IT Cryptocurrency Reputation Tools Computer Fan Webcam Sync Cables Licensing Authentication Print Server MSP Internet exploMicrosoft Virtual Reality Remote Support Smart Office NarrowBand Windows Server 2008 Amazon Web Services WIndows 7 Insurance nternet Crowdfunding Storage Uninterrupted Power Supply Software Tips Remote Work Knowledge Printer Server Shortcut Safe Mode Customers Password Manager FENG Law Firm IT Remote Worker Advertising Worker Commute HVAC Company Culture PC Care Telephony Unified Communications Patch Management User Nanotechnology Rootkit Scalability Politics Television Transportation How to Troubleshooting Webinar Techology Automobile Public Computer Benefits Thank You IT solutions Employer Employee Relationship CrashOverride Smart Technology Congratulations Loyalty Books Experience Regulation Content Two Factor Authentication Battery Emergency Worker Video Games Music Printers Audiobook Assessment

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: